Robust data hiding scheme for highly compressed image exploiting btc with hamming code

Compression techniques can be used on digital content to minimize duplication and maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities such as data concealing and images compression can be combined into a single module, reducing the risk of responder attac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2024, Vol.83 (3), p.8591-8628
Hauptverfasser: Datta, Kankana, Jana, Biswapati, Singh, Prabhash Kumar, Chakraborty, Mamata Dalui
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8628
container_issue 3
container_start_page 8591
container_title Multimedia tools and applications
container_volume 83
creator Datta, Kankana
Jana, Biswapati
Singh, Prabhash Kumar
Chakraborty, Mamata Dalui
description Compression techniques can be used on digital content to minimize duplication and maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities such as data concealing and images compression can be combined into a single module, reducing the risk of responder attacks while improving execution efficacy. This study exploits Block Truncation Coding ( BTC ) with (7, 4) Hamming error correction and detection code to render a robust data hiding policy within highly compressed images. To compress the host image, BTC has been utilized which divides the image into ( 4 × 4 ) blocks. These blocks are categorized into two groups namely complex and smooth, based on threshold value where each smooth block accommodate two secret data bits encoded in it employing (7, 4) Hamming code whereas complex block remain unaltered. On the other hand, the Vertical Redundancy Check ( VRC ) approach greatly aids in determining the location of the hidden message bit. The cover or host image can be partially recovered due to the lossy property of BTC image compression scheme. To test its robustness and imperceptibility, several standard NIST approved steganalysis and statistical attacks are carried out. The developed technique is found to be secure and strong against a variety of geometrical attacks. The virtues of the proposed scheme are presented by comparing experimental results to the state-of-the-art schemes. The anticipated consequence highlighted certain outstanding magnificent aspects in the fields of verification of image, tamper recognition, and digital forgery sensing, all of which are essential to the contemporary technological life. This scheme benefits a wide range of government and business sectors, as well as health care, security, intellectual property rights, commercial and defense.
doi_str_mv 10.1007/s11042-023-15727-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2911647062</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2911647062</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-e4bd853aec3fea26cc8e05f4df637907263c5fddfbe2bf5e1b28844455a8cf2d3</originalsourceid><addsrcrecordid>eNp9kEtLxDAUhYMoOD7-gKuA62ieTWcpgy8YEETdhjS5aTtMpzXpMM6_N2MFd67u4XLOudwPoStGbxil-jYxRiUnlAvClOaa7I7QLCtBtObsOGtRUqIVZafoLKUVpaxQXM7Qx2tfbdOIvR0tblrfbmqcXAMd4NDHvKmb9R67vhsipAQet52tAcPXsO7b8eCuRod37djgxnbdYeF6DxfoJNh1gsvfeY7eH-7fFk9k-fL4vLhbEifYfCQgK18qYcGJAJYXzpVAVZA-FELPqeaFcCp4HyrgVVDAKl6WUkqlbOkC9-IcXU-9Q-w_t5BGs-q3cZNPGj5nrJCaFjy7-ORysU8pQjBDzH_EvWHUHPiZiZ_J_MwPP7PLITGFUjZvaoh_1f-kvgF_xHUG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2911647062</pqid></control><display><type>article</type><title>Robust data hiding scheme for highly compressed image exploiting btc with hamming code</title><source>Springer Nature - Complete Springer Journals</source><creator>Datta, Kankana ; Jana, Biswapati ; Singh, Prabhash Kumar ; Chakraborty, Mamata Dalui</creator><creatorcontrib>Datta, Kankana ; Jana, Biswapati ; Singh, Prabhash Kumar ; Chakraborty, Mamata Dalui</creatorcontrib><description>Compression techniques can be used on digital content to minimize duplication and maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities such as data concealing and images compression can be combined into a single module, reducing the risk of responder attacks while improving execution efficacy. This study exploits Block Truncation Coding ( BTC ) with (7, 4) Hamming error correction and detection code to render a robust data hiding policy within highly compressed images. To compress the host image, BTC has been utilized which divides the image into ( 4 × 4 ) blocks. These blocks are categorized into two groups namely complex and smooth, based on threshold value where each smooth block accommodate two secret data bits encoded in it employing (7, 4) Hamming code whereas complex block remain unaltered. On the other hand, the Vertical Redundancy Check ( VRC ) approach greatly aids in determining the location of the hidden message bit. The cover or host image can be partially recovered due to the lossy property of BTC image compression scheme. To test its robustness and imperceptibility, several standard NIST approved steganalysis and statistical attacks are carried out. The developed technique is found to be secure and strong against a variety of geometrical attacks. The virtues of the proposed scheme are presented by comparing experimental results to the state-of-the-art schemes. The anticipated consequence highlighted certain outstanding magnificent aspects in the fields of verification of image, tamper recognition, and digital forgery sensing, all of which are essential to the contemporary technological life. This scheme benefits a wide range of government and business sectors, as well as health care, security, intellectual property rights, commercial and defense.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-15727-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Digital imaging ; Error correction ; Error detection ; Hamming codes ; Image compression ; Intellectual property ; Multimedia Information Systems ; Property rights ; Redundancy ; Robustness ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2024, Vol.83 (3), p.8591-8628</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-e4bd853aec3fea26cc8e05f4df637907263c5fddfbe2bf5e1b28844455a8cf2d3</citedby><cites>FETCH-LOGICAL-c319t-e4bd853aec3fea26cc8e05f4df637907263c5fddfbe2bf5e1b28844455a8cf2d3</cites><orcidid>0000-0003-4476-3459</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-15727-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-15727-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,778,782,27911,27912,41475,42544,51306</link.rule.ids></links><search><creatorcontrib>Datta, Kankana</creatorcontrib><creatorcontrib>Jana, Biswapati</creatorcontrib><creatorcontrib>Singh, Prabhash Kumar</creatorcontrib><creatorcontrib>Chakraborty, Mamata Dalui</creatorcontrib><title>Robust data hiding scheme for highly compressed image exploiting btc with hamming code</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Compression techniques can be used on digital content to minimize duplication and maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities such as data concealing and images compression can be combined into a single module, reducing the risk of responder attacks while improving execution efficacy. This study exploits Block Truncation Coding ( BTC ) with (7, 4) Hamming error correction and detection code to render a robust data hiding policy within highly compressed images. To compress the host image, BTC has been utilized which divides the image into ( 4 × 4 ) blocks. These blocks are categorized into two groups namely complex and smooth, based on threshold value where each smooth block accommodate two secret data bits encoded in it employing (7, 4) Hamming code whereas complex block remain unaltered. On the other hand, the Vertical Redundancy Check ( VRC ) approach greatly aids in determining the location of the hidden message bit. The cover or host image can be partially recovered due to the lossy property of BTC image compression scheme. To test its robustness and imperceptibility, several standard NIST approved steganalysis and statistical attacks are carried out. The developed technique is found to be secure and strong against a variety of geometrical attacks. The virtues of the proposed scheme are presented by comparing experimental results to the state-of-the-art schemes. The anticipated consequence highlighted certain outstanding magnificent aspects in the fields of verification of image, tamper recognition, and digital forgery sensing, all of which are essential to the contemporary technological life. This scheme benefits a wide range of government and business sectors, as well as health care, security, intellectual property rights, commercial and defense.</description><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Digital imaging</subject><subject>Error correction</subject><subject>Error detection</subject><subject>Hamming codes</subject><subject>Image compression</subject><subject>Intellectual property</subject><subject>Multimedia Information Systems</subject><subject>Property rights</subject><subject>Redundancy</subject><subject>Robustness</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kEtLxDAUhYMoOD7-gKuA62ieTWcpgy8YEETdhjS5aTtMpzXpMM6_N2MFd67u4XLOudwPoStGbxil-jYxRiUnlAvClOaa7I7QLCtBtObsOGtRUqIVZafoLKUVpaxQXM7Qx2tfbdOIvR0tblrfbmqcXAMd4NDHvKmb9R67vhsipAQet52tAcPXsO7b8eCuRod37djgxnbdYeF6DxfoJNh1gsvfeY7eH-7fFk9k-fL4vLhbEifYfCQgK18qYcGJAJYXzpVAVZA-FELPqeaFcCp4HyrgVVDAKl6WUkqlbOkC9-IcXU-9Q-w_t5BGs-q3cZNPGj5nrJCaFjy7-ORysU8pQjBDzH_EvWHUHPiZiZ_J_MwPP7PLITGFUjZvaoh_1f-kvgF_xHUG</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Datta, Kankana</creator><creator>Jana, Biswapati</creator><creator>Singh, Prabhash Kumar</creator><creator>Chakraborty, Mamata Dalui</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-4476-3459</orcidid></search><sort><creationdate>2024</creationdate><title>Robust data hiding scheme for highly compressed image exploiting btc with hamming code</title><author>Datta, Kankana ; Jana, Biswapati ; Singh, Prabhash Kumar ; Chakraborty, Mamata Dalui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-e4bd853aec3fea26cc8e05f4df637907263c5fddfbe2bf5e1b28844455a8cf2d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Digital imaging</topic><topic>Error correction</topic><topic>Error detection</topic><topic>Hamming codes</topic><topic>Image compression</topic><topic>Intellectual property</topic><topic>Multimedia Information Systems</topic><topic>Property rights</topic><topic>Redundancy</topic><topic>Robustness</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Datta, Kankana</creatorcontrib><creatorcontrib>Jana, Biswapati</creatorcontrib><creatorcontrib>Singh, Prabhash Kumar</creatorcontrib><creatorcontrib>Chakraborty, Mamata Dalui</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Datta, Kankana</au><au>Jana, Biswapati</au><au>Singh, Prabhash Kumar</au><au>Chakraborty, Mamata Dalui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust data hiding scheme for highly compressed image exploiting btc with hamming code</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2024</date><risdate>2024</risdate><volume>83</volume><issue>3</issue><spage>8591</spage><epage>8628</epage><pages>8591-8628</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Compression techniques can be used on digital content to minimize duplication and maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities such as data concealing and images compression can be combined into a single module, reducing the risk of responder attacks while improving execution efficacy. This study exploits Block Truncation Coding ( BTC ) with (7, 4) Hamming error correction and detection code to render a robust data hiding policy within highly compressed images. To compress the host image, BTC has been utilized which divides the image into ( 4 × 4 ) blocks. These blocks are categorized into two groups namely complex and smooth, based on threshold value where each smooth block accommodate two secret data bits encoded in it employing (7, 4) Hamming code whereas complex block remain unaltered. On the other hand, the Vertical Redundancy Check ( VRC ) approach greatly aids in determining the location of the hidden message bit. The cover or host image can be partially recovered due to the lossy property of BTC image compression scheme. To test its robustness and imperceptibility, several standard NIST approved steganalysis and statistical attacks are carried out. The developed technique is found to be secure and strong against a variety of geometrical attacks. The virtues of the proposed scheme are presented by comparing experimental results to the state-of-the-art schemes. The anticipated consequence highlighted certain outstanding magnificent aspects in the fields of verification of image, tamper recognition, and digital forgery sensing, all of which are essential to the contemporary technological life. This scheme benefits a wide range of government and business sectors, as well as health care, security, intellectual property rights, commercial and defense.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-15727-w</doi><tpages>38</tpages><orcidid>https://orcid.org/0000-0003-4476-3459</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2024, Vol.83 (3), p.8591-8628
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2911647062
source Springer Nature - Complete Springer Journals
subjects Computer Communication Networks
Computer Science
Data Structures and Information Theory
Digital imaging
Error correction
Error detection
Hamming codes
Image compression
Intellectual property
Multimedia Information Systems
Property rights
Redundancy
Robustness
Special Purpose and Application-Based Systems
title Robust data hiding scheme for highly compressed image exploiting btc with hamming code
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T10%3A34%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20data%20hiding%20scheme%20for%20highly%20compressed%20image%20exploiting%20btc%20with%20hamming%20code&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Datta,%20Kankana&rft.date=2024&rft.volume=83&rft.issue=3&rft.spage=8591&rft.epage=8628&rft.pages=8591-8628&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-15727-w&rft_dat=%3Cproquest_cross%3E2911647062%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2911647062&rft_id=info:pmid/&rfr_iscdi=true